Privacy-Preserving Technique for Insider Collusion Attack on Text and Image File Based on Fake Data

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395 -0056

Volume: 04 Issue: 04 | Apr -2017

p-ISSN: 2395-0072

www.irjet.net

Privacy-Preserving Technique for Insider Collusion Attack On Text And Image File Based On Fake Data Ms. Nilima V. Kayarkar 1, Prof. Ms. Gangotri Nathaney2 M.Tech scholar, CSE Dept., WCEM, Nagpur, India Assistant Professor, CSE, Dept., WCEM, Nagpur, India ---------------------------------------------------------------------***--------------------------------------------------------------------1

2

Abstract - Data leakage happens whenever a system that

In this system we used two term

is designed to be closed to an eavesdropper reveals some information to unauthorized parties. We know that for business purpose, it is necessary to transfer important data among many business partner and between the numbers of employees. But during this transfer of data, information is reach to unauthorized person. So it is very challenging and necessary to find leakage and guilty person responsible for information leakage. In this system we find the person which is responsible for the leakage of text as well as image file. For this we used distributor and agent. Distributor means owner of data and agents means trusted parties to whom we send data. This system finds the insider collusion attack. An insider attack is a malicious threat to an organization that come from people within the organization such as employees, contractor or business associate, who have inside information concerning the organization’s security practices, data and computer system. The main aim of this system is to find data of owner which is leaked and detect agent who leaked data. Here for text data we used kernel based algorithm and for image file we used steganography concept.

1.

Distributor: It is owner of data who send secret information to agent. 2. Agent: It is the members within the organization, means it is insider and is semi-trusted. They may leak their own data to the outsiders. In this system, we design the website where distributor and the authorized agent will log in. For new registration one has to fill the register form, and after successfully submitting the data he can logged into our system. When distributor wants to send file they add fake data according to type of file and then send file to agent.

2. LITERATURE SURVEY In [1] authors propose an insider collusion attack that carried out on data mining systems. It explains how many insiders are sufficient to do this attack. In this system insiders means person within organizations collude with outsiders. This paper introduced many proposed privacypreserving schemes to counter the attack.

Key Words: Data leakage, insider attack, distributor, agent, reveals, malicious threat, steganography.

In [2], this paper cloud computing services provide resource for organizations to improve business efficiency but also expose new possibilities for insider attacks.

1. INTRODUCTION The research shows that 33 percent of information security attacks originate from internal employee means from the insider. Here insider means the person working in the organization. Now, problem of data breaching is one of the rapidly increase type of attack. Data breach is an incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized person. In proposed system we find the attacker who carried out attack on text data file as well as image file. Here we take excel and access file for text data and jpeg format for image file. To find guilty person here we used fake object, means distributor add fake data in the original data before distributed to agent. According to this fake data we find guilty person. In text file we generate fake data by using automatic fake data generator. To generate fake data we used kernel based algorithm and for image file we used steganography concept. Here we add fake data behind the image therefore agent cannot see the fake data they only see the image.

Š 2017, IRJET

|

Impact Factor value: 5.181

In [3], it enhanced LSB technique which helps to successfully hide secret data into the cover image with minimum distortion. In this system there is no loss of original information. It is faster and reliable. In [4], the main aim of the system is to develop a steganographic application that provides good security and reliability. The proposed system uses LSB steganography concept to provide higher security and also protects the message from stego attacks.

3. PROPOSED SYSTEM In this system model is developed for finding the guilty agents. This system is used to find out attack carried out on text data as well as image file. In this system we used two functions. a) Distribution of file: The distribution of file is shown in following flow diagram. While distributing file to agent

|

ISO 9001:2008 Certified Journal

| Page 3446


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.